January 12th, 2026
This release introduces a major evolution of the CybeDefend user experience and remediation capabilities. Version 0.7.0 delivers a fully redesigned web dashboard, a next-generation Autofix engine with bulk remediation via pull requests, and a breakthrough approach to fixing SCA vulnerabilities, even deep within transitive dependencies. We also significantly expanded our IaC detection coverage and improved result readability with advanced vulnerability grouping.
The CybeDefend web dashboard has undergone a complete overhaul to provide a more modern, intuitive, and efficient user experience.
Cleaner and more structured layouts for faster navigation.
Improved readability of scan results and security insights.
Optimized workflows for triage, remediation, and reporting.
Designed to scale better with large projects and high vulnerability volumes.
This redesign significantly reduces cognitive load for both developers and security teams.
We introduced a brand-new Autofix engine, designed to be faster, smarter, and more scalable.
Select multiple vulnerabilities across files and categories.
Generate a single grouped Autofix Pull Request.
Consistent, secure, and idiomatic fixes aligned with your codebase and framework.
Improved fix accuracy thanks to deeper contextual analysis.
This enables teams to remediate large sets of vulnerabilities in minutes instead of hours.
CybeDefend now supports Autofix for Software Composition Analysis (SCA), powered by DeepFix, a new proprietary resolution engine.
DeepFix is capable of fixing vulnerabilities even when they originate from transitive dependencies:
Analyzes complex dependency graphs with multiple transitive import paths.
Identifies valid remediation paths among competing dependency trees.
Recommends safe upgrades of parent dependencies to eliminate vulnerable child libraries.
Avoids breaking changes whenever possible by selecting the most compatible fix path.
This brings true, actionable remediation to SCA, where traditional tools often stop at detection.
To improve result readability and prioritization, vulnerabilities can now be visualized in a grouped mode.
Vulnerabilities of the same type are merged into a single logical occurrence.
Grouping applies even when findings span multiple files or locations.
Quickly assess impact without being overwhelmed by repetitive detections.
Ideal for large repositories and refactoring-oriented workflows.
You can still drill down into each individual occurrence when needed.
We have added more than 1,000 new Infrastructure as Code detection rules, significantly expanding coverage across cloud providers and configuration patterns.